General

  • Target

    0f63caf808e459b8bf4da9355048ff3bdc47b03de2ceceeb813e494aa738c0f1.bin

  • Size

    3.4MB

  • Sample

    240109-1yykwsbce6

  • MD5

    19a78be812d33fd3c0d57241763950df

  • SHA1

    f47d6e3a31594424279429536551cd289b4be392

  • SHA256

    0f63caf808e459b8bf4da9355048ff3bdc47b03de2ceceeb813e494aa738c0f1

  • SHA512

    60a3d8614a7897aa83f2874a9e39c58e055e6e3f680175c77314a0377cbb492dc862fca77b3d8ee287fafef88692c64ad42cb223418c36b9288ac22dcc020391

  • SSDEEP

    98304:DKidS+0YvujZRFJJAC7/B7KAQbS5hX4tNyu:/Szj7FJvZ7lQ0p4tNb

Malware Config

Targets

    • Target

      0f63caf808e459b8bf4da9355048ff3bdc47b03de2ceceeb813e494aa738c0f1.bin

    • Size

      3.4MB

    • MD5

      19a78be812d33fd3c0d57241763950df

    • SHA1

      f47d6e3a31594424279429536551cd289b4be392

    • SHA256

      0f63caf808e459b8bf4da9355048ff3bdc47b03de2ceceeb813e494aa738c0f1

    • SHA512

      60a3d8614a7897aa83f2874a9e39c58e055e6e3f680175c77314a0377cbb492dc862fca77b3d8ee287fafef88692c64ad42cb223418c36b9288ac22dcc020391

    • SSDEEP

      98304:DKidS+0YvujZRFJJAC7/B7KAQbS5hX4tNyu:/Szj7FJvZ7lQ0p4tNb

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks